WIRELESS physical layer security is becoming increasingly

Size: px
Start display at page:

Download "WIRELESS physical layer security is becoming increasingly"

Transcription

1 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature Song Fang, Yao Liu, and Peng Ning Abstract Wireless link signature is a physical layer authentication mechanism, using the multipath effect between a transmitter and a receiver to provide authentication of wireless signals. This paper identifies a new attack, called mimicry attack, against the existing wireless link signature schemes. An attacker can forge a legitimate transmitter s link signature as long as it knows the legitimate signal at the receiver s location, and the attacker does not have to be at exactly the same location as the legitimate transmitter. We also extend the mimicry attack to multiple-input multiple-output (MIMO) systems, and conclude that the mimicry attack is feasible only when the number of attacker antennas is equal to or larger than that of the receiver s antennas. To defend against the mimicry attack, this paper proposes a novel construction for wireless link signature, called time-synched link signature, by integrating cryptographic protection and time factor into wireless physical layer features. Experimental results confirm that the mimicry attack is a real threat and the newly proposed time-synched link signatures are effective in physical layer authentication. Index Terms Link signature, MIMO, time-synched. I. INTRODUCTION WIRELESS physical layer security is becoming increasingly important as wireless devices are more and more pervasive and adopted in critical applications. There have been multiple proposals in recent years to provide enhanced wireless security using physical layer characteristics, including fingerprinting wireless devices (e.g., [1] [4]), authenticating and identifying wireless channels (e.g., [5], [6]), and deriving secret keys from wireless channel features only observable to the communicating parties (e.g., [7], [8]). Among the recent advances in wireless physical layer security is (wireless) link signature. Link signature uses the unique wireless channel characteristics (e.g., the multipath effect) between a transmitter and a receiver to provide Manuscript received September 18, 2015; revised December 23, 2015; accepted March 2, Date of publication March 11, 2016; date of current version April 12, This work was supported in part by the National Science Foundation under Grant and Grant , and in part by the Army Research Office under Grant W911NF An earlier version of this paper was presented at the 2012 IEEE International Conference on Computer Communications and the 2011 Conference on Computer and Communications Security Poster. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Lifeng Lai. S. Fang and Y. Liu are with the Department of Computer Science and Engineering, University of South Florida, Tampa, FL USA ( songf@mail.usf.edu; yliu@cse.usf.edu). P. Ning is with Samsung Research American, Mountain View, CA USA ( peng.ning@samsung.com). Color versions of one or more of the figures in this paper are available online at Digital Object Identifier /TIFS authentication of the wireless channel. Three link signature schemes [5], [6], [9] have been proposed so far. Since its initial introduction, link signature has been recognized as a physical layer authentication mechanism for applications where wireless channel characteristics is unique for individual nodes (e.g., [2], [7], [10] [12]). In this paper, we identify the mimicry attack against these link signature schemes. We start our investigation with the link signature scheme in [5]. It is assumed in [5] that an attacker cannot spoof an arbitrary link signature and that the attacker will not have the same link signature at the receiver unless it is at exactly the same location as the legitimate transmitter. However, we show in this paper that an attacker can forge an arbitrary link signature as long as it knows the legitimate signal at the receiver s location, and the attacker does not have to be at exactly the same location as the legitimate transmitter in order to forge its link signature. We also extend the mimicry attack to the link signature scheme in [9]. Since the last link signature scheme in [6] is essentially an integration of the techniques in [5] and [6], all existing link signature schemes are vulnerable to the mimicry attack. Furthermore, we find that if the receiver has two antennas to cooperatively authenticate the transmitter, the attacker with only one antenna cannot successfully launch the mimicry attack. However, we discover that the mimic attack is still feasible if the attacker also has two antennas. Then we explore the feasibility of the mimicry attack into MIMO systems. If the number of the receiver s receive antennas is larger than that of the attacker s transmit antennas, the receiver can detect the mimicry attack, otherwise, the receiver can be fooled that the attacker s link signatures are the same with the ones of the authenticated transmitter s. The mimicry attack can apply to the following example scenarios when link signatures are used for authentication: (1) launching location spoofing attacks: an attacker can utilize a fake location to fool a target receiver by creating a fake wireless link signaturer; (2) bypassing motion detection systems: an attacker could maintain its wireless signature unchanged while it is actually moving, thus from the perspective of the target receiver, who utilizes the wireless link signature to determine whether the transmitter moves or not, the attacker appears to remain stationary; (3) bypassing wireless transmitter authentication systems: an attacker can impersonate a legitimate transmitter by forging its wireless link signature. To provide physical layer authentication capability and defend against the threats identified in this paper, we develop IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See for more information.

2 1516 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 Fig. 1. Multipath example: The transmitted signal propagates over four paths, and the receiver receives corresponding signal copies s 1, s 2, s 3,ands 4. a novel construction for link signature, which is called timesynched (i.e., time synchronized) link signature. Time-synched link signature integrates cryptographic protection as well as time factor into the wireless physical layer features, and provides an effective and practical solution for authenticating physical layer wireless signals. We also perform an extensive set of experimental evaluation of the mimicry attacks and the time-synched link signature scheme on the USRP2 platform [13] running GNURadio [14]. Our experiments show that the mimicry attack can deteriorate the success rate of distinguishing between the legitimate transmitter and the attacker to , which is close to a blind guess. However, with an optimum threshold, the proposed time-synched link signature is able to restore the success rate to Our contribution in this paper is three-fold. First, we identify the mimicry attack against existing link signature schemes and extend the mimicry attack to MIMO systems. Second, we develop the time-synched link signature scheme to defend against various threats against existing link signature schemes, including the mimicry attacks presented in this paper. Finally, we perform extensive experiments to confirm the threats of the mimicry attack and demonstrate the effectiveness of the time-synched link signature for physical layer authentication. The rest of the paper is organized as follows. Section II first gives some background information for link signatures. Sections III introducea the mimicry attacks and Sections IV explores the feasibility of the mimicry attacks in MIMO systems. In Section V, we present our proposed timesynched link signature. Next, Section VI gives our experimental confirmation of the mimicry attack as well as evaluation of the time-synched link signature, and Section VII discusses related work. Finally, Section VIII concludes this paper. II. PRELIMINARIES In this section, we give some preliminary information on link signatures, including multipath effect, channel impulse response, and how these are used for wireless link signatures. A. Multipath Effect, Channel Impulse Response Wireless signal usually propagates in the air along multiple paths due to reflection, diffraction, and scattering [5]. For example, as shown in Figure 1, the receiver receives multiple copies of the transmitted signal from different paths, each of which may have a different delay due to the path it traversed on. The received signal is indeed the sum of these time delayed signal copies. Each path imposes a response (e.g., distortion and attenuation) on the signal traveling along it [5], and the superposition of all responses between two nodes is referred to as a channel impulse response [15]. The multipath effects between different pairs of nodes are usually different, and so are the channel impulse responses [5]. Due to this reason, a channel impulse response between two nodes is also called a link signature, and has been proposed to provide robust location distinction and location-based authentication [5], [6], [11]. Specifically, when a transmitter and attackers are in different locations, to determine whether a received signal is from the transmitter, the receiver can estimate the link signature of the received signal and compare it with the known value from the transmitter. The received signal is accepted only if the estimated link signature is similar to the known value. B. Estimating Channel Impulse Responses A popular method for estimating channel impulse responses is the training sequence based estimation [16]. The transmitter first sends a training sequence (i.e., a sequence of bits) over the wireless channel. The receiver then uses the training sequence and the corresponding received signal samples to estimate channel impulse responses, where the data value of the training sequence can be pre-shared [16] or reconstructed from the received signal through demodulation [5]. Note that at the physical layer channel estimation can be processed in either frequency domain (e.g. [5], [6]) or time domain (e.g., [16]). Because of the linear relationship between the two domains, frequency and time domain based methods are inter-convertible. In the following, we describe the channel estimation method in the time domain. 1) Mathematical Formulation: To transmit the training sequence, the transmitter converts it into M physical layer symbols (i.e., complex numbers that are transmission units at the physical layer [15]). The transmitter then sends the M symbols to the wireless channel. Let x =[x 1, x 2,...,x M ] denote the transmitted symbols in the training sequence. Assume that there exist L paths. Thus, the receiver can receive L copies of x, each traveling on one path and undergoing a response (i.e., distortion and attenuation) caused by the corresponding path. The vector y of received symbols is the convolution sum of the L copies of x. Let h =[h 1, h 2,...,h L ] T be the channel impulse response, where h i is the response of the i-th path, and n denote the channel noise. Thus, the received symbols y can be represented by y = h x + n [16], where is the convolution operator. With the matrix form, we have x x 2 x 1 x 2 0 h 1 x L x 1 h 2 y = x M x M L+1 + n (1) 0 x M h L 0 0 x M

3 FANG et al.: MIMICRY ATTACKS AGAINST WIRELESS LINK SIGNATURE AND NEW DEFENSE 1517 Rewriting Equation (1) in a compact matrix form gives us y = Xh + n, (2) where X is a (L + M 1) L Toeplitz matrix, containing L delayed versions of the transmitted symbols x, andy is a vector consisting of (L + M 1) received symbols. 2) Estimation: Two types of estimators are generally used to estimate h from Equation (2): least-square (LS) and linear minimum mean squared error (LMMSE) [17]. If the statistical distribution of the channel impulse responses and noise are unknown, the LS estimator is usually used. If the statistical distribution of the channel impulse responses and noise are known, the LMMSE estimator is often used. For the LS estimator, the estimation result is given by ĥ LS = (X H X) 1 X H y, where X H is the conjugate transpose of X and () 1 is the matrix inverse operation [18]. For the LMMSE estimator, the estimation result is: ĥ LMMSE = R h (R h +σn 2(XXH ) 1 ) 1 ĥ LS, where R h is the channel correlation matrix (i.e., the statistical expectation of hh H )andσn 2 is the variance of the noise [19]. III. MIMICRY ATTACK In this section, we present the mimicry attack against link signature schemes [5], [6], [9]. A. Overview Let y t and y a denote the received symbols that are from the transmitter and the attacker, respectively. The attacker s goal is to make y a approximately the same as y t. When the receiver attempts to extract the link signature from y a, it will get a link signature that is very similar to the one estimated from y t. As a result, the attacker can impersonate the transmitter to bypass link signature based authentication. The attacker needs to meet two requirements to launch a mimicry attack: First, the attacker needs to know the transmitter s symbols (i.e., y t ) at the receiver s location. Second, the attacker needs to manipulate its own symbols to be transmitted such that when they arrive at the receiver they are similar to those from the transmitter (i.e., y a y t ). B. Obtaining Transmitter s Symbols There are multiple ways for the attacker to obtain the transmitter s symbols at the receiver s location. For example, the attacker may learn y t by placing a sensing device in the proximity of the receiver. For the sake of presentation, we call this device the symbol sensor. It records the symbols received from the transmitter and reports them to the attacker through any available communication channel. Note that the characteristic of the wireless channel becomes uncorrelated every half a carrier wavelength over distance [20]. Normally, the symbol sensor would be placed within a range of half a carrier wavelength away from the receiver (e.g., for a 2.4 GHz signal, its wavelength equals to 12.5 cm). Thus, the symbols that the symbol sensor receives are roughly the same as those received by the receiver, and can be used as y t. The attacker can also use the mathematical model y t = h t x + n to derive y t,whereh t is the link signature between the transmitter and the receiver. Specifically, the symbol sensor can receive symbols from the transmitter, estimate the link signature from these symbols, and report the link signature to the attacker. The attacker can use the reported link signature as an approximation of h t to calculate y t.inthis case, the symbol sensor only needs to report the derived link signatures from time to time, and the attacker can calculate y t directly by using the estimated link signature h t rather than wait for the sensor to report y t. C. Manipulating Transmitted Symbols The symbols y a received from the attacker can be represented as y a = h a x a + n a,wherex a, h a,andn a are the symbols transmitted by the attacker, the link signature of the attacker, and the channel noise, respectively. To make y a equal to y t, the attacker can treat x a as a unknown variable, and solve it from the equation h a x a +n a = y t, where link signature h a of the attacker can be obtained from the symbol sensor as well. For previous wireless link signature based authentication schemes [1] [6], the channel impulse response is assumed to be unchanged in a short time or change slowly. Similarly, we assume that the attacker s link signature does not change between obtaining the attacker s link signature and launching the mimicry attack. The solution to this equation enables y a to be similar to or the same as the transmitter s symbols y t. As a result, the link signatures that are estimated from y a will also be close to those estimated from y t. Let x a =[x a1, x a2,...,x am ] T denote the symbols transmitted by the attacker, and h a =[h a1, h a2,...,h al ] T denote the link signature of the attacker. We have y t = h a x a + n a = X a h a + n a h a1 0 0 h a2 h a1 h a2 0 x a1 = h a1 x a2 h al h a2 0 h al + n a 0 x am 0 0 h al = H a x a + n a. where H a is the Toeplitz matrix of the attacker s link signature. Therefore, y t = h a x a +n a y t = H a x a +n a. We can solve x a from y t = H a x a + n a.sincen a is unknown, we use the standard least square approach [18] to solve x a. Specifically, we minimizes y t H a ˆx a 2,whereˆx a is the approximate solution of x a. The minimization yields ˆx a = (Ha H H a) 1 Ha H y t. (3) Elements in x a are already physical layer symbols, and thus they can be transmitted directly. The attacker does not need to modulate them again for transmission. D. Extending Attack to Multiple Tone Probing Based Link Signature There are two other link signature schemes [6], [9] besides the one we just attacked [5]. The scheme in [9], referred to as

4 1518 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 the multiple tone probing based link signature, uses complex gain at different frequencies to build a link signature, and the scheme in [6] is an integration of the techniques in [5] and [9]. In the following, we show that we can extend the mimicry attack to also compromise the multiple tone probing based link signature, thus making all existing link signature schemes vulnerable. In multiple tone probing, K carrier waves are simultaneously transmitted to the receiver, and the transmitted signal is s(t) = K κ=1 e j2π f κt [6], [9], where f κ is the frequency of the κ-th carrier. Each carrier wave undergoes an attenuation at its center frequency [6]. Thus, the received signal is r(t) = K κ=1 H κ e j2π fκt,whereh κ is the complex channel gain that reflects the amount of attenuation on the κ-th carrier wave. The vector h = [H 1, H 2,...,H K ] of the complex channel gain is used as the link signature [6], [9]. The mimicry attack identified in this paper can also be adapted to attack the multiple tone probing based link signature. Let h a =[H a1, H a2,...,h ak ] denote the multiple tone link signature between the attacker and the receiver, and h t = [H t1, H t2,...,h tk ] denote the one between the transmitter and the receiver. With the knowledge of h t,the attacker can generate a signal in the following form, s a (t) = K κ=1 H tκ H aκ e j2π f κt = K κ=1 H tκ H aκ e j (2π f κt+θ aκ θ tκ ), where. denote the magnitude of a complex number, θ aκ and θ tκ are the phases of H aκ and H tκ, respectively. After channel attenuation, the corresponding received signal is r a (t) = K κ=1 H tκ H aκ H aκ e j2π f κt = K H tκ e j2π fκt, κ=1 which equals to the signal r t (t) received from the transmitter. As a result, the multiple tone link signature estimated from r a (t) is the same as that estimated from r t (t). Since the link signature scheme in [6] is essentially an integration of the scheme in [5] and [9], the above result also makes the scheme in [6] vulnerable to mimicry attacks. IV. MIMICRY ATTACKS AGAINST MIMO One may wonder whether the mimicry attack still works in MIMO wireless communication systems. To answer this question, we first explore a simple communication scenario, where the receiver has multiple antennas while the attacker just owns one antenna. A. Mimicry Attacks With One Antenna As shown in Figure 2, the receiver is equipped with two receive antennas (antennas A and B). The link signatures between the transmitter and the two antennas of the receiver are h 1 and h 2 respectively. There also exists an attacker, who launches the mimicry attack to impersonate the transmitter. Assume that the attacker knows the link signatures h 1 and h 2 between himself and the two antennas of the receiver, respectively. The attacker can learn these link signatures before launching the mimicry attack via multiple methods, such as Fig. 2. Mimicry attacks when the receiver has two antennas while the attack has only one antenna. putting a eavesdropper near the receiver. Hence, if the mimicry attack is successful, for antenna A, we can get X a h 1 = Xh 1, (4) where X a is the Teoplitz matrix of the transmitted sequence x a. We omit the noise to simplify the equations. Likewise, for antenna B, we have X a h 2 = Xh 2. (5) In a successful mimicry attack, both Equations (4) and (5) are satisfied. In other words, if we can find a solution of X a, the receiver will incorrectly think that the attacker is the transmitter. However, Equations (4) and (5) have only one unknown variable X a,andh 1 and h 2 are linearly independent from each other due to the spatial uncorrelation property of wireless channels [15]. Thus, these two equations form an overdetermined linear system. In such a system, it is infeasible for the attacker to find an exact solution of X a to make Equations (4) and (5) hold at the same time. Hence, when the receiver utilizes two antennas to cooperatively authenticate the transmitter, the attacker with only one antenna may fail to launch the mimicry attack. This implies that extra antennas at the receiver can help to mitigate the mimicry attack. B. Mimicry Attacks With Two Antennas In this section, we investigate the feasibility of the mimicry attack when the attacker and the receiver both have two antennas, and we discover that the mimicry attack is feasible in such MIMO systems. As shown in Figure 3, the receiver has antenna A and antenna B, and the attacker has antenna 1 and antenna 2. Thus, there exist 4 pairs of antennas and we denote the corresponding link signatures by h 1a, h 1b, h 2a and h 2b. If the mimicry attack is successful, for antenna A, we can get X a1 h 1a + X a2 h 2a = Xh 1, (6) where X a1 and X a2 are the Teoplitz matrices of the sequences x a1, x a2 transmitted by antenna 1 and antenna 2, respectively. Likewise, for antenna B, we have X a1 h 1b + X a2 h 2b = Xh 2. (7)

5 FANG et al.: MIMICRY ATTACKS AGAINST WIRELESS LINK SIGNATURE AND NEW DEFENSE 1519 Fig. 3. Mimicry attacks when the receiver has two antennas while the attack also has two antennas. Equations (6) and (7) have two unknown variables X a1, X a2. Hence, the system formed by the two equations is not overdetermined and the attacker can find an exact solution to satisfy both equations. Rewrite Equations (6) and (7), we get H 1a x a1 + H 2a x a2 = Xh 1 and H 1b x a1 + H 2b x a2 = Xh 2,whereH ij (i {1, 2} and j {a, b}) isa(m + L 1) M Teoplitz matrix and the transmitted sequences x a1, x a2 are M 1 vectors. Thus, we can get [ H1a H 2a H 1b ][ ] xa1 H 2b x a2 [ H1a H Let H denote 2a = [ ] Xh1 Xh 2 (8) H 1b H 2b ], then we can solve the transmitter sequences x a1 and x a2 using the LS estimator, and the result is [ ] [ ] xa1 = (H x H H) 1 H H Xh1 a2 Xh 2 C. Mimicry Attacks in General Scenarios We further extend the previous result to a general situation, where the receiver has P antennas to cooperatively authenticate the transmitter and the attacker has Q antennas to launch the mimicry attack. Assume the chosen link signatures that the attacker would like to mimic are represented by h 1, h 2,...,h P, and the attacker s real link signature between the antenna of the attacker and the antenna of the receiver is denoted as h ij,wherei {1, 2,...,P} and j {1, 2,...,Q}. Thus, we have H 11 x a1 + H 21 x a2 + +H Q1 x aq = Xh 1 H 12 x a1 + H 22 x a2 + +H Q2 x aq = Xh 2 (10). H 1P x a1 + H 2P x a2 + +H QP x aq = Xh P, where x a1, x a2,, x aq are sequences transmitted by the attacker s Q antennas. Note that the matrix H ji must be full rank. Thus, we can see that Q should be equal to or larger than P in order to solve the transmit sequences from (10). Specifically, When Q > P, (10) is an under-determined linear system, and x ai has an infinite number of solutions. When Q = P, (10) has the same number of equations and unknowns, and x ai has a single unique solution. (9) Fig. 4. Mimicry attack in MIMO systems using CRAWDAD data. This result indicates that the attacker must utilize at least the same number of antennas as the receiver to make the mimicry attack feasible. D. Simulation Results To validate the feasibility of the mimicry attack against MIMO systems, we use the CRAWDAD data set [21], which contains over 9,300 link signatures measured in an indoor environment with obstacles and scatters. First, we pick up two nodes as the two antennas of the receiver (i.e., nodes 40 and 38), and two other nodes as the attacker s two transmit antennas (i.e., nodes 24 and 25). Then, we record the link signatures between each pair of transmit and receive antennas. Also, we choose another node (i.e., node 23) from the data set as the transmitter. The attacker aims to fool the receiver by mimicking the transmitter s link signatures (i.e., the one between nodes 23 and 40, and that between nodes 23 and 38). The attacker computes the corresponding transmitted sequences x a1, x a2 based on Equation (10), and sends them to the receiver. The receiver estimates the corresponding link signatures based on the received symbols and the public training sequence. As shown in Figure 4, both the link signatures estimated by the receiver antennas A and B are correspondingly close to the transmitter s two real link signatures. Based on the CRAWDAD set, we randomly pick one link signature for the link between the transmitter and antenna A as the comparison base h 1, and another link signature for the link between the transmitter and antenna B as the comparison base h 2. The Euclidean distance between h 1 and the other link signatures for the link between the transmitter and antenna A ranges between and , whereas the Euclidean distance between estimated link signature and the transmitter s link signature at antenna A is , which falls in the above range. Also, the Euclidean distance between h 2 and the other link signatures for the link between the transmitter and antenna B ranges between and , whereas the Euclidean distance between estimated link signature and the transmitter s link signature at antenna B is , which also lies in the above range. Therefore, the attacker can successfully fool the receiver into believing that his link signatures are the same as those of the transmitter. The simulation result verifies that it is still

6 1520 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 possible to launch mimicry attacks to forge link signatures in MIMO systems. V. TIME-SYNCHED LINK SIGNATURE In this section, we develop a novel time-synched link signature to defend against the mimicry attacks. A key feature of this new mechanism is the integration of cryptographic protection and time factor into wireless link signatures. A. Assumptions and Threat Model We assume that there are a Transmitter and a Verifier, sharing a secret key K that is only known to them. Note that this assumption does not contradict with the goal of wireless link signatures, because the main purpose of link signatures is to provide the authentication of locations and this cannot be achieved by using a shared key. The Transmitter sends packets, or more precisely, physical layer frames, to the Verifier, who then verifies if these frames are directly transmitted by the Transmitter. We assume that the attacker can eavesdrop, overhear, and jam wireless communications. Also, the attacker is assumed to be able to transmit with a higher power to generate a capture effect to overwhelm the signal sent by the transmitter. However, we assume that the attacker cannot compromise the Transmitter or the Verifier, and thus does not know their secret. The attacker s goal is to generate or forward frames to the Verifier and convince it that the frames were transmitted directly by the Transmitter. By doing so the attacker may want to convince the Verifier to derive incorrect physical layer characteristics about the transmission (e.g., wrong Received Signal Strength, leading to incorrect estimate of distance). Given that a cryptographic authentication mechanism (e.g., digital signature, Message Integrity Code (MIC)) can be added to a message to detect forged messages, the main threat is from the frames that are originally generated by the Transmitter but forwarded by the attacker. We focus on the case when the attacker can jam and replay the Transmitter s frames (i.e., the jam-and-replay attack [22]). In the other cases where the Verifier can receive the original transmission by the Transmitter, a duplication detection mechanism (e.g., sequence number) along with authentication can properly detect the frames forwarded by the attacker. We assume that the attacker can launch frame repeater attacks. That is, the attacker is able to receive a frame transmitted by the Transmitter and then forward the frame to the Verifier. Such frame repeaters are widely available commercially (e.g., various brands of repeaters). We also assume that the attacker can launch physical layer symbol repeater attacks. That is, the attacker can observe the transmission of each physical layer symbol, which may represent one or multiple bits in the frame, and then forward the symbol to the Verifier directly. Such repeaters can be developed using noise canceling techniques and proper positioning of antennas, as described in [23]. Compared with frame repeater attacks, symbol repeater attacks are much harder to defend against. Link signatures are specific to wireless communication channels, and usually require a training phase for two nodes to learn the actual value. The attacker may target at either the training phase to mislead the Transmitter and the Verifier about their link signature, or the operational phase (as described in Section III) when the link signature is used for physical layer authentication. Thus, a secure link signature has to protect both the training and the operational phases. B. Design Strategy The fundamental reason for the mimicry attack is that the (sniffing) attacker can establish a set of equations based on two pieces of information: (1) the training sequence and (2) the Transmitter s signal (i.e., physical layer symbols) at the Verifier s location. These allow the attacker to manipulate the transmitted physical layer symbols so that a frame sent by the attacker has a valid link signature. To defend against this attack, our strategy is to deprive the attacker at least one of these two pieces of information. It is in general very difficult to prevent a passive attacker from receiving signals (and then extracting valid link signatures). However, it is possible to prevent the attacker from knowing the training sequences. Thus, our initial idea is to use unpredictable, dynamic, and authenticated training sequences for extracting link signatures from wireless packets (frames). 1) Detecting Frames Forwarded by Attackers: It is not hard to realize that simply using unpredictable, dynamic, and authenticated training sequences is still insufficient. The attacker can receive and analyze the Transmitter s signal to learn the training sequence. If the Verifier cannot receive the original transmission (e.g., due to jam-and-replay attack), the attacker can still forge link signatures by manipulating and forwarding a frame received from the Transmitter. To handle this threat, we propose to bring time into the scheme. We assume the Transmitter and the Verifier have synchronized clocks. (As we will show in the proposed scheme, in the training phase the Transmitter and the Verifier will synchronize their clocks to meet this assumption.) The Transmitter may include a timestamp in the transmitted frame, which indicates the time when a particular bit or byte (e.g., the Start of Frame Delimiter (SFD) field in an IEEE or frame [24]) is transmitted over the air. We assume that the Transmitter can use authenticated timestamping techniques (e.g., [25]) to ensure that the timestamp precisely represents the point in time when the SFD field is transmitted in air. As a result, upon receiving a frame, the Verifier can use the timestamp included in the frame and the time when it receives the frame, which should also be obtained through Medium Access Control (MAC) layer timestamping [25], to estimate the traveling time of the frame. An overly long time indicates that the frame has been forwarded by an intermediate attacker. Also, an attacker may revise the timestamp to conceive the Verifier that the calculated delay is small. To avoid such attacks, the Transmitter will send the MIC of the entire frame along with the frame to the Verifier. Thus any revision of the timestamp by an attacker will be detected by the Verifier.

7 FANG et al.: MIMICRY ATTACKS AGAINST WIRELESS LINK SIGNATURE AND NEW DEFENSE 1521 Using MAC layer timestamping can defend against the frame repeater attack fairly well. For example, in an g wireless network, which supports 54 Mbps bandwidth, the transmission of a 100-byte frame takes about 14.8μs. To maximize the chance to detect retransmitted frames, we may force certain critical frames (e.g., those used to extract physical layer properties such as Received Signal Strength (RSS)) to have a large frame size. In the case of g, the maximum frame size is 2,346 octets (bytes), which will take about 347.6μs to transmit. A frame repeater will have to double the transmission time, giving the Verifier a good chance to detect the extra delay and thus detect the attack. 2) Defending Against Physical Layer Symbol Repeater Attacks: A physical layer symbol repeater attack is much harder to detect than frame repeater attacks. If the attacker knows where the training sequence is located in the frame, she can start repeating the physical layer symbols right after she finishes receiving all symbols corresponding to the training sequence. This reduces the delay that the physical layer symbol repeater has to tolerate to the transmission time of only the training sequence, which could be much shorter than the transmission time of the entire frame. Note that the calculation process of the symbol repeater attack is the same as that of the frame forwarding attack mentioned earlier. For the symbol repeater attack, the attacker starts forwarding manipulated symbols right after she recognizes the training sequence. For the frame forwarding attack, the attacker starts forwarding manipulated symbols once she receives a entire frame. In both attacks, the attacker has to know the training sequence and the processes of calculating the symbols to be transmitted by the attacker are exactly the same, as described in Section III-C. To defend against such physical layer symbol repeater attacks, we propose to integrate a third idea into the scheme, that is, to make the location of the training sequence unpredictable until the end of the frame transmission. Specifically, we propose to insert the training sequence at a randomly selected location in the payload, and place this location, which can be represented as the offset from the start of the frame header, at the end of the frame. In order for a physical layer symbol repeater to mimic the link signature of the Transmitter, she has to manipulate the physical layer symbols corresponding to the training sequence in a frame. If the location of the training sequence is not revealed until the end of the frame, the attacker will have to wait until the end of the transmission to learn it. This forces a physical layer symbol repeater attack to degenerate into a frame repeater attack, which can be handled as discussed earlier. 3) Minimum Frame Length: If a frame payload is too short, the Verifier may have difficulty seeing the extra delay caused by a frame repeater. One solution is to pad extra bits into the frame payload if the frame length is less than a minimum frame length. The minimum frame length can be determined based on the errors of the time synchronization and time measurement. Assume that the maximum errors in clock discrepancy and transmission time are e δ and e τ, respectively. Further assume that the maximum time measurement errors in Fig. 5. PHY layer frame format. the Transmitter and the Verifier are e T and e V, respectively. Thus, the maximum error that the Verifier has to tolerate is e all = e δ + e τ + e T + e V. Assume that the data rate of the wireless communication is R. It is easy to see that when the frame length is greater than the minimum frame length L min = R e all, the Verifier is guaranteed to detect frames forwarded by frame repeaters. It has been demonstrated in an implementation of Radio Frequency (RF) distance bounding protocol [26] that nanosecond processing delay is feasible to achieve. The timesynched link signature requires much less precision in time synchronization between the Transmitter and the Verifier. For example, even assuming e all is between 1μs and 10μs, in a 54 Mbps g wireless network, L min will range between 7 bytes and 68 bytes. 4) Overall Design: Figure 5 illustrates how these ideas can be integrated into a physical layer protocol. The upper portion of Figure 5 shows the layout of a typical physical layer frame, which consists of a series of preamble symbols, the frame header, and the payload. To detect frames forwarded by attackers, we include in each frame a timestamp t s,which indicates the transmission time of the frame. To defend against physical layer repeater attacks, we include the randomly generated offset P of the training sequence in each frame at the end of the frame (to force the attacker to wait until the end of frame transmission). Assume the Transmitter and the Verifier share a secret key K. Given the shared secret key, there are may ways to generate an unpredictable, dynamic, and authenticated training sequence. One simple method is to piggyback the authentication of the frame with the generation of the training sequence, that is, to use the MIC of the entire frame as the training sequence x. In situations where there is a mismatch between the MIC and the training sequence (e.g., when a longer training sequence is needed), we can simply generate the training sequence as x = F(K, t s ), where F is a pseudo-random function, and compute the frame MIC separately. The use of K and t s makes x dynamic and unpredictable, and the frame MIC allows x to be authenticated. In the following, we present the detailed procedure of time-synched link signature, including the training phase and the operational phase. C. Training Phase The training phase is intended for the Verifier to collect enough information from the Transmitter so that the Verifier

8 1522 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 can verify the link signatures of the future frames from the Transmitter. The Verifier should obtain the valid link signature from the Transmitter whenever the link signature between them may change. This can be accomplished by executing the training phase protocol periodically or whenever one of them moves. In the training phase, the Verifier needs to synchronize its clock with the Transmitter, and obtain the link signature for the current communication channel. At the same time, the Verifier needs to confirm that there is no successful attack during the training phase. We use the classic time synchronization technique to estimate the clock discrepancy between the Transmitter and the Verifier as well as the frame traverse time. This approach has been used in the past for secure time synchronization (e.g., [22], [25]). For the sake of presentation, we refer to the point in time when the SFD field of a frame is transmitted or received as the transmission time or the receiving time of this frame. Specifically, the Verifier sends a request frame to the Transmitter, and at the same time records the frame transmission time t 1 in the Verifier s local clock. When the Transmitter receives the request frame, it records the receiving time t 2 of this frame, and then sends a reply frame to the Verifier, in which t 2 and the transmission time t 3 of the reply frame, which are both measured in the Transmitter s clock, are included. Finally, the Verifier receives the reply frame and records the receiving time t 4 in its clock. The clock discrepancy δ between the Verifier and the Transmitter and the one-way frame traverse time τ can then be estimated as follows (e.g., [22], [25], [27]): δ = (t 2 t 1 ) (t 4 t3) 2 ; τ = (t 2 t 1 ) + (t 4 t 3 ). (11) 2 The Transmitter and the Verifier face a subtle difficulty in time synchronization due to the need of authentication: The timestamps t 1 and t 3 should be the actual transmission time of the request and reply frames; however, the MIC computation requires the timestamp value before the actual transmission. Fortunately, a solution has been previously developed for this problem [25]. It is observed that in the physical layer protocol component, all computation is deterministic if the wireless channel is available for transmission. Thus, we can estimate how much time the deterministic processing will take before (the SFD field of) the frame is transmitted and thus determine the transmission time before computing the frame MIC. If the frame transmission does not happen due to channel unavailability, the estimation, the computation of the MIC, and the transmission can be repeated. To defend against potential frame repeater and physical layer symbol repeater attacks, we use the design given in Section V-B. That is, the Transmitter pads the reply frame payload so that after all necessary components of the frame are included, the frame length is at least the minimum frame length L min. The Transmitter uses the MIC of the entire frame as the link signature training sequence, and places it at a random offset in the frame payload. Finally, the Transmitter places the random offset at the end of the frame. Fig. 6. Training phase protocol. Figure 6 shows the training phase protocol between the Transmitter and the Verifier. 1) Training Request: The Verifier sends the first training request frame to the Transmitter, which includes the frame header, the transmission time t 1 of this frame, and the frame MIC that covers the entire frame (excluding the preambles). Upon receiving of the request frame, the Transmitter immediately records the receiving time t 2 of the frame, and authenticates the request frame by verifying the MIC. We can also filter some bogus requests before verifying the MIC. Though a clock discrepancy between the Transmitter and the Verifier is expected, there is usually a maximum clock discrepancy δ max.if(t 2 + δ max t 1 ) is too large, it is likely that the request frame is a replay of a previous request frame, and should be discarded without verification. 2) Training Reply: Upon verifying an incoming training request frame, the Transmitter should send back a training reply frame. The Transmitter should include time t 2 and the actual transmission time t 3 of the reply frame in the frame. The Transmitter also pads the frame payload to at least the minimum frame length L min and randomly selects an offset P to place the training sequence as discussed earlier. The Transmitter then leaves a placeholder (e.g., all 0 s) in place of the training sequence and computes the frame MIC using the shared key K. Finally, the Transmitter places the frame MIC as the training sequence x in the reply frame and sends it over the air. Once the Verifier receives the training reply frame, the Verifier first computes the clock discrepancy δ and the oneway transmission time τ according to Equation (11). If τ is greater than a threshold τ max, which is the maximum possible direct transmission time, the Verifier should consider the reply frame as possibly forwarded by the attacker and discard it. Otherwise, the Verifier locates the frame MIC by following the offset P at the end of the frame, authenticates the frame MIC using the shared key K, and uses the frame MIC, which is also the training sequence x, to extract the link signature. The Verifier may run the training phase protocol several times to get a better quality link signature. As a result, the Verifier obtains the valid link signature to perform physical layer authentication of future frames from the Transmitter. D. Operational Phase Once the Verifier obtains the clock discrepancy and the valid link signature from the Transmitter, the two nodes can go into the operational phase, during which the Verifier can use this link signature to verify frames that require physical layer authentication.

9 FANG et al.: MIMICRY ATTACKS AGAINST WIRELESS LINK SIGNATURE AND NEW DEFENSE ) Transmitter: To defend against the threats discussed in Section V-A, the Transmitter follows the design shown in Figure 5. Specifically, the Transmitter randomly selects an offset in the frame payload to include the field for the training sequence. 1 The Transmitter also includes the transmission time t s, places the offset P at the end of the frame, and computes the frame MIC using the shared secrete key K, with a placeholder (e.g., all 0 s) for the training sequence. The Transmitter then uses the frame MIC as the training sequence x, puts it in the frame, and sends the frame over the air. Similar to the training phase, the Transmitter estimates the frame transmission t s based on the current time and the estimated duration for the deterministic MIC computation. 2) Verifier: When the Verifier receives the frame, it immediately records the receiving time t r. The Verifier then retrieves the frame transmission time t s from the received frame and estimates the frame traverse time τ = t s t r δ, where δ is the clock discrepancy between the Verifier and the Transmitter learned in the training phase. If τ is greater than the threshold τ max, the maximum possible direct transmission time, the Verifier should consider the frame possibly forwarded by the attacker and discard it. Otherwise, the Verifier locates the frame MIC by using the offset P at the end of the frame, verifies the frame MIC using the shared key K, and then uses the frame MIC as the training sequence to extract the link signature. Finally, the Verifier compares this link signature with the one derived during the training phase. The frame is accepted if this link signature does not deviate from the valid one learned in the training phase. Otherwise, the frame is considered forged and discarded. E. Security Analysis Now let us examine the ability of the time-synched link signature to defend against the malicious threats. First of all, the time-synched link signature uses a training sequence authenticated with a shared secret key only known to the Transmitter and the Verifier, and the training sequence changes from frame to frame due to the involvement of the timestamp in the computation of the training sequence. Thus, the training sequence is authenticated, dynamic, and unpredictable. This effectively prevents the attacker from forging frames with training sequences of its choice. The only choice left for the attacker is to reuse and manipulate valid frames from the Transmitter. The use of random offset for the training sequence in the frame payload forces the attacker to wait for the end of the frame transmission to understand where the training sequence is located in the frame. As a result, the attacker cannot launch physical layer symbol repeater attacks and at the same time manipulate the training sequence correctly to bypass link signature verification. The attacker may still perform the frame repeater attack. However, due to the enforcement of the minimum frame length, a frame forwarded by a frame 1 Note that the training sequence is necessary for the Verifier to extract the link signature. It is used in the operational phase even though its name has training in it. repeater will introduce at least the amount of delay caused by the receiving of the frame, which is detectable by the Verifier. The attacker may launch a probabilistic mimicry attack by randomly guessing the location of the training sequence and forging the frame symbols accordingly. Indeed, the attacker may also try to overestimate the length of the training sequence and perform the forgery. If the assumed training sequence y t is a superset of the actual one y t (i.e., y t is a subsequence of y t ), due to the linear property of Equation (3), the forged symbols ˆx a will also include ˆx a as a subsequence. This will allow the attacker s symbols to be accepted by the receiver. However, the attacker cannot delay the transmission of a frame for L min or more; otherwise, its interference will be detected. This means that the probability for the attacker to succeed is at most p = L min x +1 F x +1 when L min is greater than or equal x, where x and F are the length of the training sequence and the frame payload, respectively. When L min is less than x, the probability of a successful mimicry attack degrades to 0. For example, in a 54Mbps g wireless network, if we can achieve 2.96μs precision in the time synchronization and measurement error (i.e., e all = 2.96μs and L min = bits) and use HMAC-SHA1 to generate the training sequence (i.e., x =160 bits), the probabilistic mimicry attack is guaranteed to fail. Nevertheless, the probabilistic mimicry attack does increase the requirement for time synchronization. In other words, the Transmitter and the Verifier need to obtain fine-grained time synchronization so that the success probability of a probabilistic mimicry attack becomes negligible. VI. EXPERIMENTAL EVALUATION We have implemented the link signature scheme in [5], the mimicry attack, and the newly proposed time-synched link signature. We have also implemented the frame repeater attack, which can be used along with the mimicry attack. Our prototype uses USRP2 [13], which are equipped with AD and DA converters as the RF front ends, and XCVR2400 daughter boards operating in the 2.4 GHZ range as transceivers. The software implementation is based on GNURadio [14]. USRP2s are capable of processing signals up to 100MHz wide. Such a high bandwidth enables the use of them for capturing multipath effects and measuring link signatures. However, GNURadio configuration requires to set the values of interpolation (decimation) rate at the transmitter (receiver) and the number of samples per symbol. If the values of those parameters are set too high, the actual bandwidth will be significantly reduced. To guarantee the capture of multipath effect, we set those parameters the minimum values allowed by GNURadio (i.e., 5 for interpolation and decimation rate, and 2 for number of samples per symbol). A. Evaluation Methodology 1) Evaluation Scenarios: Our prototype system consists of a transmitter, a receiver (i.e., the verifier in case of time-synched link signature), and an attacker. Each node is a USRP2 connected to a commodity PC. The receiver estimates

10 1524 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 the received link signatures and compares them with the transmitter s link signatures. We evaluate three scenarios: (1) normal scenario, (2) forgery scenario, and (3) defense scenario. In a normal scenario, the attacker simply sends original symbols to the receiver. In both the forgery and the defense scenarios, the receiver functions as the symbol sensor for the attacker. It estimates the link signatures for the attacker and provides this link signature and the received symbols from the transmitter to the attacker. Upon obtaining this information, the attacker launches the mimicry attack. However, the forgery scenario uses the previous link signature scheme in [5], while the defense scenario uses the newly proposed time-synched link signature. 2) Evaluation Metrics: Intuitively, the attacker wants to reduce the difference between its own link signatures and the transmitter s link signatures, whereas the defense method aims to increase this difference to alert the transmitter. Thus, the link difference between both the attacker s and the transmitter s link signatures can visually reveal the impact of mimicry attacks and the effectiveness of the defense method. The receiver measures N link signatures of the transmitter, where we set N to 50 in our evaluation. Let H denote the set formed by the N link signatures. We collect 500 link signatures from the attacker, and calculate the link difference d a,h between H and them. For the purpose of comparison, we also let the receiver collect 500 link signatures from the transmitter, and calculate the link difference d t,h between H and those newly collected link signatures. According to [5], the above link difference (i.e., d a,h and d t,h ) is calculated using σ 1 min g h, whereh is a g H link signature of the attacker or the transmitter, and σ is the historical average difference between link signatures in H [5], 1 and is given by σ = q g. N(N 1) g Hq H g Link signature based authentication serves as a detector that decides whether or not a received signal is from the desired source. Thus, besides link difference, we also use detection rate P D (i.e., the rate that an attacker s link signature is successfully detected by the receiver) and false alarm rate P FA (i.e., a transmitter s link signature is incorrectly identified as the attacker s link signature) as two additional evaluation metrics. Finally, we measure the time delay introduced by the transmitter and the attacker to assess how well the frame repeaters can be detected. Fig. 10. scenario. Fig. 7. Normal scenario. Fig. 8. Forgery scenario. Fig. 9. Defense scenario. Link difference for the transmitter and the attacker in normal B. Evaluation Results We now show how mimicry attacks affect the link difference, false alarm rate, detection rate, and the tradeoff between the detection and the false alarm rates in the normal, forgery, and defense scenarios. 1) Link Difference: Figures 7, 8, and 9 show the link difference for the attacker d a,h and that for the transmitter d t,h in the normal, forgery, and defense scenarios, respectively. In the normal scenario, we see in Figure 7 that d a,h is generally larger than d t,h. The histograms d a,h and d t,h are shown in Figure 10. Most of the transmitter s link difference is less than 0.6, whereas most of the attacker s link difference is larger than 0.6. Thus, based on the value of link difference, the receiver can achieve a high accuracy in distinguishing between the transmitter and the attacker. In the forgery scenario, the attacker launches mimicry attacks to make its own link signatures similar to the transmitter s link signatures. We see in Figure 8 that d a,h decreases to the same level as d t,h,andd a,h and d t,h substantially overlap with each other. The histogram of d a,h (i.e., the top graph in Figure 11) shows that the link difference distribution of the attacker gets very close to that of the transmitter. The mimicry attack reduces the difference between the attacker s link signatures and the transmitter s link signatures, leading to high false negative rate at the receiver.

11 FANG et al.: MIMICRY ATTACKS AGAINST WIRELESS LINK SIGNATURE AND NEW DEFENSE 1525 Fig. 11. Link difference for the attacker in forgery and defense scenarios. Fig. 13. Tradeoff between false alarm and detection rate. Fig. 12. False alarm rate P FA and detection rate P D. In the defense scenario, as indicated in Figure 9, the use of time-synched link signature increases d a,h of forged link signatures. In particular, the mean value of d a,h under defense and forgery scenarios are and , respectively. The histogram of d a,h in the defense scenario (i.e., the bottom graph in Figure 11) shows that the link difference computed from a majority of forged signatures is smaller than 0.6. Thus, the receiver can again distinguish between the transmitter and the attacker with low error rate. 2) Detection and False Alarm Rates: As we mentioned earlier, a history of N transmitter s link signatures is measured and stored at the receiver, and the receiver computes the link difference d between a newly measured link signature and history link signatures. In our experiment, we follow the same detection rule as used in [5]. Specifically, if d is smaller than a certain threshold r, the receiver concludes that this link signature is from the transmitter. Otherwise, the receiver assumes that it is from the attacker. Let N FA denote the number of link signatures that are actually from the transmitter but incorrectly identified as from the attacker, and N D denote the number of link signatures that are from the attacker and detected by the receiver. The false alarm rate P FA is calculated as the ratio of N FA to the total number of the transmitter s link signatures, and the detection rate P D is computed as the ratio of N D to the total number of the attacker s link signatures. Figure 12 shows P FA and P D as a function of the threshold r. A large threshold can reduce false alarm rate P FA, whereas a small threshold can increase detection rate. Therefore, an optimum threshold that can both minimize false alarm rate and maximize detection rate is usually desired by the receiver. Such optimum threshold actually occurs at the point where the distance between P FA and P D is the largest (i.e., P D P FA is the largest). The optimum threshold of the normal, defense, and forgery scenarios are , , and , respectively. For the normal scenario, the corresponding P FA and P D achieved by the optimum threshold are P FA = and P D = The defense scenario slightly outperforms the normal scenario in terms of reducing P FA and increasing P D with the optimum threshold, leading to P FA = and P D = The forgery scenario has the worst performance. With the optimum threshold, P FA = and P D = Note that, in our experiment, a link signature is either from the transmitter or from the attacker, and thus the probability that a blind guess hits the true source of this link signature is 0.5. The false alarm rate P FA and detection rate P D in the forgery scenario are just slightly better than a blind guess. Figure 13 shows the receiver operating characteristic (ROC) curves for the normal, forgery, and defense scenarios, in which the P FA and P D are the x-axis and y-axis, respectively. The curve representing the defense scenario is on the topleft corner of the figure, indicating good performance of the time-synched link signature. 3) Frame Time Delay: The proposed time-synched link signature uses estimated frame traverse to filter out frames forwarded by the attacker. We measure the time delay of frames from the transmitter and the attacker, respectively, to examine this approach. In our experiment, the frame length is 190 bits and the transmission rate is set to 500Kbps. The transmitter sends 130 frames, and the attacker forwards all of them. Thus, the receiver receives 260 frames in total. Figure 14 shows that the time delays of frames forwarded by the attacker significantly exceed those of the frames directly by the transmitter. Our further analysis indicates that the ratio of attacker s delay to the transmitter s delay ranges between 2.2 and 2.6, indicating that the forwarding by the attacker approximately doubles the time delay. We would like to caution the reader that due to the limitation of USRP2, our implementation does not perform physical layer timestamping. Thus, the time delay measured in our experiments include the processing time on the PC and the USRP2 boards. In a real deployment, physical layer timestamping is necessary to increase the precision of time synchronization and time measurement.

12 1526 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 7, JULY 2016 Fig. 14. Time delay of forwarded packets and original packets. VII. RELATED WORK A. Wireless Transmitter Authentication Existing techniques using non-cryptographic approaches to authenticate wireless transmitters can be classified into three categories [2]: software fingerprinting (e.g., [28] [30]), location distinction (e.g., [5], [6], [9]), and radiometric identification (e.g., [2], [31]). In software fingerprinting approaches, discrepancies in software configuration are used as fingerprints to distinguish between wireless nodes [2]. For example, Franklin et al. [28] proposed to use the implementation dependent differences among device drivers to identify nodes. Kohno et al. [30] proposed to use clock skews in TCP and ICMP timestamps to fingerprint networked devices. In location distinction based authentication, a signal is authenticated by verifying whether it originates from the expected location of the transmitter. RSS (e.g., [32]) and link signatures have been used to enable such location distinction [5]. The RSS based methods directly estimate the location of a signal origin using the RSS values. However, such methods can be defeated with an array antenna, which can fake arbitrary source locations [5]. The link signature based approaches authenticate the channel characteristics between the transmitter and the receiver [5], [6], [9]. In this paper, we showed that all these link signature scheme are vulnerable to mimicry attacks. Our newly proposed time-synched link signature is developed to fill this gap. In radiometric identification approaches, the distinctive physical layer characteristics exhibited by wireless devices are utilized to distinguish between them. Transient based techniques (e.g., [31]) identify a wireless device by looking at the unique features during the transient phase when the radio is turned on [33]. Modulation based techniques (e.g., [2]) measure differentiating artifacts of individual wireless frames in the modulation domain to identify the device. B. Attacks on Radiometric Identification Recently, it was demonstrated in [33] and [34] that radiometric identification techniques were vulnerable to impersonation attacks. The results in [33] revealed that both transient and modulation based techniques are vulnerable to impersonation attacks, though transient-based techniques are harder to reproduce. Edman and Yener [34] showed that an attacker can significantly reduce the accuracy of such techniques by simply using a commodity RF hardware platform. These works are complementary to ours in this paper. In our previous works [35] and [36], we only addressed the simple mimicry attack scenario, where both the receiver and the attacker have only one antenna. In this paper, we discussed the general case when both the receiver and the attacker have multiple antennas, and discovered that the mimicry attack is still feasible in MIMO systems, as long as the attacker can utilize at least the same number of antennas as the receiver. We also extended mimicry attacks to the multiple tone probing based link signature and showed that mimicry attacks can make all existing link signature schemes vulnerable. Furthermore, in [36], we only compared the link differences for the attacker and the transmitter in the normal, forgery and defense scenarios, respectively. In this paper, we further explored how to set an appropriate threshold that enables the proposed time-synched link signature scheme to achieve a high detection rate while keeping a low false alarm rate in the three scenarios. VIII. CONCLUSION In this paper, we identified the mimicry attack against the existing wireless link signature schemes. We then extended the mimicry attack in MIMO systems and concluded that the attacker utilizing at least the same number of antennas as the receiver s antennas can successfully launch the mimicry attack. To defend against the mimicry attack, we proposed the novel time-synched link signature construction by integrating cryptographic protection and time factor into wireless physical layer features. We also performed an extensive set of experiments to demonstrate both the feasibility of mimicry attacks and the effectiveness of time-synched link signature. REFERENCES [1] D. B. Faria and D. R. Cheriton, Detecting identity-based attacks in wireless networks using signalprints, in Proc. ACM Workshop Wireless Secur. (WiSec), 2006, pp [2] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, Wireless device identification with radiometric signatures, in Proc. 14th ACM Int. Conf. Mobile Comput. Netw. (MobiCom), 2008, pp [3] R. M. Gerdes, T. E. Daniels, M. Mina, and S. Russell, Device identification via analog signal fingerprinting: A matched filter approach, in Proc. 13th Annu. Symp. Netw. Distributted Syst. Secur. (NDSS), 2006, pp [4] L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee, Identifying unique devices through wireless fingerprinting, in Proc. 1st ACM Conf. Wireless Netw. Secur. (WiSec), 2008, pp [5] N. Patwari and S. K. Kasera, Robust location distinction using temporal link signatures, in Proc. 13th Annu. ACM Int. Conf. Mobile Comput. Netw. (MobiCom), 2007, pp [6] J. Zhang, M. H. Firooz, N. Patwari, and S. K. Kasera, Advancing wireless link signatures for location distinction, in Proc. 14th ACM Int. Conf. Mobile Comput. Netw. (MobiCom), 2008, pp [7] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel, in Proc. 14th ACM Int. Conf. Mobile Comput. Netw. (MobiCom), 2008, pp [8] H. Liu, Y. Wang, J. Yang, and Y. Chen, Fast and practical secret key extraction by exploiting channel response, in Proc. IEEE INFOCOM, Apr. 2013, pp [9] Z. Li, W. Xu, R. Miller, and W. Trappe, Securing wireless systems via lower layer enforcements, in Proc. ACM Workshop Wireless Secur. (WiSec), 2006, pp

13 FANG et al.: MIMICRY ATTACKS AGAINST WIRELESS LINK SIGNATURE AND NEW DEFENSE 1527 [10] Y. Liu, P. Ning, and H. Dai, Authenticating primary users signals in cognitive radio networks via integrated cryptographic and wireless link signatures, in Proc. IEEE Symp. Secur. Privacy (S&P), May 2010, pp [11] K. Zeng, K. Govindan, and P. Mohapatra, Non-cryptographic authentication and identification in wireless networks, IEEE Wireless Commun., vol. 17, no. 5, pp , Oct [12] A. Kalamandeen, A. Scannell, E. de Lara, A. Sheth, and A. LaMarca, Ensemble: Cooperative proximity-based authentication, in Proc. 8th Int. Conf. Mobile Syst., Appl., Services (MobiSys), 2010, pp [13] Ettus Research. The USRP Product Family Products and Daughter Boards, accessed on Apr [Online]. Available: [14] GNU Radio The GNU Software Radio, accessed on Sep [Online]. Available: [15] A. Goldsmith, Wireless Communications. Cambridge, U.K.: Cambridge Univ. Press, [16] R. Safaya. A Multipath Channel Estimation Algorithm Using a Kalman Filter, accessed on Apr [Online]. Available: ku.edu/research/thesis/documents/rupul_safaya_thesis.pdf [17] M. Biguesh and A. B. Gershman, Training-based MIMO channel estimation: A study of estimator tradeoffs and optimal training signals, IEEE Trans. Signal Process., vol. 54, no. 3, pp , Mar [18] K. S. Shanmugan and A. M. Breipohl, Random Signals: Detection, Estimation and Data Analysis. New York, NY, USA: Wiley, May [19] O. Edfors, M. Sandell, J. J. van de Beek, S. K. Wilson, and P. O. Börjesson, OFDM channel estimation by singular value decomposition, IEEE Trans. Commun., vol. 46, no. 7, pp , Jul [20] X. He, H. Dai, W. Shen, and P. Ning, Is link signature dependable for wireless security? in Proc. IEEE INFOCOM, Apr. 2013, pp [21] Sensing and Processing Across Networks at Utah. Measured Channel Impulse Response Data Set, accessed on Sep [Online]. Available: Main.MeasuredCIRDataSet [22] S. Ganeriwal, S. Čapkun, C.-C. Han, and M. B. Srivastava, Secure time synchronization service for sensor networks, in Proc. ACM Workshop Wireless Secur. (WiSec), Sep. 2005, pp [23] J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, Achieving single channel, full duplex wireless communication, in Proc. 16th ACM Mobicom (Mobicom), Sep. 2010, pp [24] IEEE Standard for Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks Specific Requirements. Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs), IEEE Standard , [25] K. Sun, P. Ning, and C. Wang, TinySeRSync: Secure and resilient time synchronization in wireless sensor networks, in Proc. 13th ACM Conf. Comput. Commun. Secur. (CCS), 2006, pp [26] K. B. Rasmussen and S. Čapkun, Realization of RF distance bounding, in Proc. USENIX Secur. Symp., 2010, pp [27] D. L. Mills, Internet time synchronization: The network time protocol, IEEE Trans. Commun., vol. 39, no. 10, pp , Oct [28] J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker, Passive data link layer wireless device driver fingerprinting, in Proc. Usenix Secur. Symp., 2006, pp [29] J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, user fingerprinting, in Proc. 13th Annu. ACM Int. Conf. Mobile Comput. Netw. (MobiCom), 2007, pp [30] T. Kohno, A. Broido, and K. Claffy, Remote physical device fingerprinting, IEEE Trans. Dependable Secure Comput., vol. 2, no. 2, pp , Apr./Jun [31] B. Danev and S. Čapkun, Transient-based identification of wireless sensor nodes, in Proc. ACM/IEEE Conf. Inf. Process. Sensor Netw. (IPSN), Apr. 2009, pp [32] R. Chen, J. M. Park, and J. H. Reed, Defense against primary user emulation attacks in cognitive radio networks, IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp , Jan [33] B. Danev, H. Luecken, S. Čapkun, and K. El Defrawy, Attacks on physical-layer identification, in Proc. 3rd ACM Conf. Wireless Netw. Secur. (WiSec), Mar. 2010, pp [34] M. Edman and B. Yener, Active attacks against modulation-based radiometric identification, Dept. Comput. Sci., Rensselaer Polytechn. Inst., Troy, NY, USA, Tech. Rep. TR 09-02, [35] Y. Liu and P. Ning, Poster: Mimicry attacks against wireless link signature, in Proc. 16th ACM Conf. Comput. Commun. Secur. (CCS), 2011, pp [36] Y. Liu and P. Ning, Enhanced wireless channel authentication using time-synched link signature, in Proc. IEEE INFOCOM, Mar. 2012, pp Song Fang received the B.S. degree in information engineering from the South China University of Technology, Guangzhou, China, in 2011, and the M.S. degree in communication and information engineering from the Beijing University of Posts and Telecommunications, Beijing, China, in He is currently pursuing the Ph.D. degree in computer science from the University of South Florida, Tampa, FL. His research interests are in the area of network security and system security. Yao Liu received the Ph.D. degree in computer science from North Carolina State University, in She is currently an Assistant Professor with the Department of Computer Science and Engineering, University of South Florida, Tampa, FL. Her research is related to computer and network security, with an emphasis on designing and implementing defense approaches that protect emerging wireless technologies from being undermined by adversaries. Her research interests also lie in the security of cyber-physical systems, especially in smart grid security. She was the recipient of the best paper award for the Seventh IEEE International Conference on Mobile Ad-Hoc and Sensor Systems. Peng Ning is currently a Professor with the Department of Computer Science, North Carolina State University, Raleigh, NC, USA. He is on leave at Samsung Mobile, Santa Clara, CA, USA, where he is leading the Samsung KNOX Research and Development Team. His research interests are primarily in mobile security, wireless security, and cloud computing security.

Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks

Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu and Tao Wang Abstract In wireless networks, location distinction aims to detect

More information

Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage

Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage Song Fang, Yao Liu University of South Florida {songf@mail, yliu@cse}.usf.edu Wenbo Shen North Carolina State University

More information

Authenticating Primary Users Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures

Authenticating Primary Users Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures Authenticating Primary Users Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures Yao Liu, Peng Ning Department of Computer Science North Carolina State University

More information

An HARQ scheme with antenna switching for V-BLAST system

An HARQ scheme with antenna switching for V-BLAST system An HARQ scheme with antenna switching for V-BLAST system Bonghoe Kim* and Donghee Shim* *Standardization & System Research Gr., Mobile Communication Technology Research LAB., LG Electronics Inc., 533,

More information

MIMO RFIC Test Architectures

MIMO RFIC Test Architectures MIMO RFIC Test Architectures Christopher D. Ziomek and Matthew T. Hunter ZTEC Instruments, Inc. Abstract This paper discusses the practical constraints of testing Radio Frequency Integrated Circuit (RFIC)

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios

A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios Noha El Gemayel, Holger Jäkel, Friedrich K. Jondral Karlsruhe Institute of Technology, Germany, {noha.gemayel,holger.jaekel,friedrich.jondral}@kit.edu

More information

Multiple Antenna Techniques

Multiple Antenna Techniques Multiple Antenna Techniques In LTE, BS and mobile could both use multiple antennas for radio transmission and reception! In LTE, three main multiple antenna techniques! Diversity processing! The transmitter,

More information

Effects of Fading Channels on OFDM

Effects of Fading Channels on OFDM IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 116-121 Effects of Fading Channels on OFDM Ahmed Alshammari, Saleh Albdran, and Dr. Mohammad

More information

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER Dr. Cheng Lu, Chief Communications System Engineer John Roach, Vice President, Network Products Division Dr. George Sasvari,

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily

More information

CHAPTER 2 WIRELESS CHANNEL

CHAPTER 2 WIRELESS CHANNEL CHAPTER 2 WIRELESS CHANNEL 2.1 INTRODUCTION In mobile radio channel there is certain fundamental limitation on the performance of wireless communication system. There are many obstructions between transmitter

More information

Design of Simulcast Paging Systems using the Infostream Cypher. Document Number Revsion B 2005 Infostream Pty Ltd. All rights reserved

Design of Simulcast Paging Systems using the Infostream Cypher. Document Number Revsion B 2005 Infostream Pty Ltd. All rights reserved Design of Simulcast Paging Systems using the Infostream Cypher Document Number 95-1003. Revsion B 2005 Infostream Pty Ltd. All rights reserved 1 INTRODUCTION 2 2 TRANSMITTER FREQUENCY CONTROL 3 2.1 Introduction

More information

Professor Paulraj and Bringing MIMO to Practice

Professor Paulraj and Bringing MIMO to Practice Professor Paulraj and Bringing MIMO to Practice Michael P. Fitz UnWiReD Laboratory-UCLA http://www.unwired.ee.ucla.edu/ April 21, 24 UnWiReD Lab A Little Reminiscence PhD in 1989 First research area after

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Spectrum Sensing Brief Overview of the Research at WINLAB

Spectrum Sensing Brief Overview of the Research at WINLAB Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2004 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily

More information

Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure

Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure Abstract Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2003 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Localization in Wireless Sensor Networks

Localization in Wireless Sensor Networks Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem

More information

Robust Location Distinction Using Temporal Link Signatures

Robust Location Distinction Using Temporal Link Signatures Robust Location Distinction Using Temporal Link Signatures Neal Patwari Sneha Kasera Department of Electrical and Computer Engineering What is location distinction? Ability to know when a transmitter has

More information

Channel-based Optimization of Transmit-Receive Parameters for Accurate Ranging in UWB Sensor Networks

Channel-based Optimization of Transmit-Receive Parameters for Accurate Ranging in UWB Sensor Networks J. Basic. ppl. Sci. Res., 2(7)7060-7065, 2012 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and pplied Scientific Research www.textroad.com Channel-based Optimization of Transmit-Receive Parameters

More information

Frequency Synchronization in Global Satellite Communications Systems

Frequency Synchronization in Global Satellite Communications Systems IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 3, MARCH 2003 359 Frequency Synchronization in Global Satellite Communications Systems Qingchong Liu, Member, IEEE Abstract A frequency synchronization

More information

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum CIS 632 / EEC 687 Mobile Computing Mobile Communications (for Dummies) Chansu Yu Contents Modulation Propagation Spread spectrum 2 1 Digital Communication 1 0 digital signal t Want to transform to since

More information

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Sriram Nandha Premnath Academic Advisors: Sneha K. Kasera, Neal Patwari nandha@cs.utah.edu, kasera@cs.utah.edu, npatwari@ece.utah.edu

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS

SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS RASHMI SABNUAM GUPTA 1 & KANDARPA KUMAR SARMA 2 1 Department of Electronics and Communication Engineering, Tezpur University-784028,

More information

Matched filter. Contents. Derivation of the matched filter

Matched filter. Contents. Derivation of the matched filter Matched filter From Wikipedia, the free encyclopedia In telecommunications, a matched filter (originally known as a North filter [1] ) is obtained by correlating a known signal, or template, with an unknown

More information

THE EFFECT of multipath fading in wireless systems can

THE EFFECT of multipath fading in wireless systems can IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998 119 The Diversity Gain of Transmit Diversity in Wireless Systems with Rayleigh Fading Jack H. Winters, Fellow, IEEE Abstract In

More information

Wireless LAN Consortium OFDM Physical Layer Test Suite v1.6 Report

Wireless LAN Consortium OFDM Physical Layer Test Suite v1.6 Report Wireless LAN Consortium OFDM Physical Layer Test Suite v1.6 Report UNH InterOperability Laboratory 121 Technology Drive, Suite 2 Durham, NH 03824 (603) 862-0090 Jason Contact Network Switch, Inc 3245 Fantasy

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss

EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss Introduction Small-scale fading is used to describe the rapid fluctuation of the amplitude of a radio

More information

[P7] c 2006 IEEE. Reprinted with permission from:

[P7] c 2006 IEEE. Reprinted with permission from: [P7 c 006 IEEE. Reprinted with permission from: Abdulla A. Abouda, H.M. El-Sallabi and S.G. Häggman, Effect of Mutual Coupling on BER Performance of Alamouti Scheme," in Proc. of IEEE International Symposium

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

Robust Location Distinction using Temporal Link Signatures

Robust Location Distinction using Temporal Link Signatures Robust Location Distinction using Temporal Link Signatures Neal Patwari Dept. of Electrical & Computer Engineering University of Utah, Salt Lake City, USA npatwari@ece.utah.edu Sneha K. Kasera School of

More information

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal

Encoding and Framing. Questions. Signals: Analog vs. Digital. Signals: Periodic vs. Aperiodic. Attenuation. Data vs. Signal Questions Encoding and Framing Why are some links faster than others? What limits the amount of information we can send on a link? How can we increase the capacity of a link? EECS 489 Computer Networks

More information

Narrow- and wideband channels

Narrow- and wideband channels RADIO SYSTEMS ETIN15 Lecture no: 3 Narrow- and wideband channels Ove Edfors, Department of Electrical and Information technology Ove.Edfors@eit.lth.se 27 March 2017 1 Contents Short review NARROW-BAND

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3,

More information

Amplitude and Phase Distortions in MIMO and Diversity Systems

Amplitude and Phase Distortions in MIMO and Diversity Systems Amplitude and Phase Distortions in MIMO and Diversity Systems Christiane Kuhnert, Gerd Saala, Christian Waldschmidt, Werner Wiesbeck Institut für Höchstfrequenztechnik und Elektronik (IHE) Universität

More information

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA By Hamed D. AlSharari College of Engineering, Aljouf University, Sakaka, Aljouf 2014, Kingdom of Saudi Arabia, hamed_100@hotmail.com

More information

Do You Know Where Your Radios Are? Phase-Comparison Direction Finding

Do You Know Where Your Radios Are? Phase-Comparison Direction Finding Do You Know Where Your Radios Are? Phase-Comparison Direction Finding Remember jumping on a trampoline as a child and stealing the bounce of a friend? A perfectly timed jump would create the destructive

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Encoding and Framing

Encoding and Framing Encoding and Framing EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Nov 2, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Questions

More information

DESIGN OF GLOBAL SAW RFID TAG DEVICES C. S. Hartmann, P. Brown, and J. Bellamy RF SAW, Inc., 900 Alpha Drive Ste 400, Richardson, TX, U.S.A.

DESIGN OF GLOBAL SAW RFID TAG DEVICES C. S. Hartmann, P. Brown, and J. Bellamy RF SAW, Inc., 900 Alpha Drive Ste 400, Richardson, TX, U.S.A. DESIGN OF GLOBAL SAW RFID TAG DEVICES C. S. Hartmann, P. Brown, and J. Bellamy RF SAW, Inc., 900 Alpha Drive Ste 400, Richardson, TX, U.S.A., 75081 Abstract - The Global SAW Tag [1] is projected to be

More information

Narrow- and wideband channels

Narrow- and wideband channels RADIO SYSTEMS ETIN15 Lecture no: 3 Narrow- and wideband channels Ove Edfors, Department of Electrical and Information technology Ove.Edfors@eit.lth.se 2012-03-19 Ove Edfors - ETIN15 1 Contents Short review

More information

An Indoor Localization System Based on DTDOA for Different Wireless LAN Systems. 1 Principles of differential time difference of arrival (DTDOA)

An Indoor Localization System Based on DTDOA for Different Wireless LAN Systems. 1 Principles of differential time difference of arrival (DTDOA) An Indoor Localization System Based on DTDOA for Different Wireless LAN Systems F. WINKLER 1, E. FISCHER 2, E. GRASS 3, P. LANGENDÖRFER 3 1 Humboldt University Berlin, Germany, e-mail: fwinkler@informatik.hu-berlin.de

More information

Secure Location Verification with Hidden and Mobile Base Stations

Secure Location Verification with Hidden and Mobile Base Stations Secure Location Verification with Hidden and Mobile Base Stations S. Capkun, K.B. Rasmussen - Department of Computer Science, ETH Zurich M. Cagalj FESB, University of Split M. Srivastava EE Department,

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Noise Plus Interference Power Estimation in Adaptive OFDM Systems

Noise Plus Interference Power Estimation in Adaptive OFDM Systems Noise Plus Interference Power Estimation in Adaptive OFDM Systems Tevfik Yücek and Hüseyin Arslan Department of Electrical Engineering, University of South Florida 4202 E. Fowler Avenue, ENB-118, Tampa,

More information

Innovative Science and Technology Publications

Innovative Science and Technology Publications Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE

More information

Presentation Outline. Advisors: Dr. In Soo Ahn Dr. Thomas L. Stewart. Team Members: Luke Vercimak Karl Weyeneth. Karl. Luke

Presentation Outline. Advisors: Dr. In Soo Ahn Dr. Thomas L. Stewart. Team Members: Luke Vercimak Karl Weyeneth. Karl. Luke Bradley University Department of Electrical and Computer Engineering Senior Capstone Project Presentation May 2nd, 2006 Team Members: Luke Vercimak Karl Weyeneth Advisors: Dr. In Soo Ahn Dr. Thomas L.

More information

ESTIMATION OF FREQUENCY SELECTIVITY FOR OFDM BASED NEW GENERATION WIRELESS COMMUNICATION SYSTEMS

ESTIMATION OF FREQUENCY SELECTIVITY FOR OFDM BASED NEW GENERATION WIRELESS COMMUNICATION SYSTEMS ESTIMATION OF FREQUENCY SELECTIVITY FOR OFDM BASED NEW GENERATION WIRELESS COMMUNICATION SYSTEMS Hüseyin Arslan and Tevfik Yücek Electrical Engineering Department, University of South Florida 422 E. Fowler

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

THE CAPACITY EVALUATION OF WLAN MIMO SYSTEM WITH MULTI-ELEMENT ANTENNAS AND MAXIMAL RATIO COMBINING

THE CAPACITY EVALUATION OF WLAN MIMO SYSTEM WITH MULTI-ELEMENT ANTENNAS AND MAXIMAL RATIO COMBINING THE CAPACITY EVALUATION OF WLAN MIMO SYSTEM WITH MULTI-ELEMENT ANTENNAS AND MAXIMAL RATIO COMBINING Pawel Kulakowski AGH University of Science and Technology Cracow, Poland Wieslaw Ludwin AGH University

More information

2 Limitations of range estimation based on Received Signal Strength

2 Limitations of range estimation based on Received Signal Strength Limitations of range estimation in wireless LAN Hector Velayos, Gunnar Karlsson KTH, Royal Institute of Technology, Stockholm, Sweden, (hvelayos,gk)@imit.kth.se Abstract Limitations in the range estimation

More information

BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOCK CODES WITH MMSE CHANNEL ESTIMATION

BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOCK CODES WITH MMSE CHANNEL ESTIMATION BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOC CODES WITH MMSE CHANNEL ESTIMATION Lennert Jacobs, Frederik Van Cauter, Frederik Simoens and Marc Moeneclaey

More information

Self-interference Handling in OFDM Based Wireless Communication Systems

Self-interference Handling in OFDM Based Wireless Communication Systems Self-interference Handling in OFDM Based Wireless Communication Systems Tevfik Yücek yucek@eng.usf.edu University of South Florida Department of Electrical Engineering Tampa, FL, USA (813) 974 759 Tevfik

More information

Rake-based multiuser detection for quasi-synchronous SDMA systems

Rake-based multiuser detection for quasi-synchronous SDMA systems Title Rake-bed multiuser detection for qui-synchronous SDMA systems Author(s) Ma, S; Zeng, Y; Ng, TS Citation Ieee Transactions On Communications, 2007, v. 55 n. 3, p. 394-397 Issued Date 2007 URL http://hdl.handle.net/10722/57442

More information

Asynchronous Space-Time Cooperative Communications in Sensor and Robotic Networks

Asynchronous Space-Time Cooperative Communications in Sensor and Robotic Networks Proceedings of the IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada July 2005 Asynchronous Space-Time Cooperative Communications in Sensor and Robotic Networks Fan Ng, Juite

More information

A New Adaptive Channel Estimation for Frequency Selective Time Varying Fading OFDM Channels

A New Adaptive Channel Estimation for Frequency Selective Time Varying Fading OFDM Channels A New Adaptive Channel Estimation for Frequency Selective Time Varying Fading OFDM Channels Wessam M. Afifi, Hassan M. Elkamchouchi Abstract In this paper a new algorithm for adaptive dynamic channel estimation

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

ELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications

ELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications ELEC E7210: Communication Theory Lecture 11: MIMO Systems and Space-time Communications Overview of the last lecture MIMO systems -parallel decomposition; - beamforming; - MIMO channel capacity MIMO Key

More information

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,

More information

Multiple Antenna Processing for WiMAX

Multiple Antenna Processing for WiMAX Multiple Antenna Processing for WiMAX Overview Wireless operators face a myriad of obstacles, but fundamental to the performance of any system are the propagation characteristics that restrict delivery

More information

Smart antenna technology

Smart antenna technology Smart antenna technology In mobile communication systems, capacity and performance are usually limited by two major impairments. They are multipath and co-channel interference [5]. Multipath is a condition

More information

CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions

CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions This dissertation reported results of an investigation into the performance of antenna arrays that can be mounted on handheld radios. Handheld arrays

More information

Rate Adaptation for Multiuser MIMO Networks

Rate Adaptation for Multiuser MIMO Networks Rate Adaptation for 82.11 Multiuser MIMO Networks paper #86 12 pages ABSTRACT In multiuser MIMO (MU-MIMO) networks, the optimal bit rate of a user is highly dynamic and changes from one packet to the next.

More information

ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals

ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals Suhas Mathur AT&T Security Research Group Rob Miller, Alex Varshavsky, Wade Trappe, Narayan Madayam Suhas Mathur (AT&T) firstname

More information

PhyCloak: Obfuscating Sensing from Communication Signals

PhyCloak: Obfuscating Sensing from Communication Signals PhyCloak: Obfuscating Sensing from Communication Signals Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan and Anish Arora Department of Computer Science and Engineering 1 RF Based Sensing Reflection

More information

An Alamouti-based Hybrid-ARQ Scheme for MIMO Systems

An Alamouti-based Hybrid-ARQ Scheme for MIMO Systems An Alamouti-based Hybrid-ARQ Scheme MIMO Systems Kodzovi Acolatse Center Communication and Signal Processing Research Department, New Jersey Institute of Technology University Heights, Newark, NJ 07102

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission

More information

Chaotic Communications With Correlator Receivers: Theory and Performance Limits

Chaotic Communications With Correlator Receivers: Theory and Performance Limits Chaotic Communications With Correlator Receivers: Theory and Performance Limits GÉZA KOLUMBÁN, SENIOR MEMBER, IEEE, MICHAEL PETER KENNEDY, FELLOW, IEEE, ZOLTÁN JÁKÓ, AND GÁBOR KIS Invited Paper This paper

More information

A Primary User Authentication System for Mobile Cognitive Radio Networks

A Primary User Authentication System for Mobile Cognitive Radio Networks A Primary User Authentication System for Mobile Cognitive Radio Networks (Invited Paper) Swathi Chandrashekar and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona, Tucson,

More information

IN RECENT years, wireless multiple-input multiple-output

IN RECENT years, wireless multiple-input multiple-output 1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang

More information

IN AN MIMO communication system, multiple transmission

IN AN MIMO communication system, multiple transmission 3390 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 55, NO 7, JULY 2007 Precoded FIR and Redundant V-BLAST Systems for Frequency-Selective MIMO Channels Chun-yang Chen, Student Member, IEEE, and P P Vaidyanathan,

More information

Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators

Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators 374 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 2, MARCH 2003 Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators Jenq-Tay Yuan

More information

Performance Analysis of n Wireless LAN Physical Layer

Performance Analysis of n Wireless LAN Physical Layer 120 1 Performance Analysis of 802.11n Wireless LAN Physical Layer Amr M. Otefa, Namat M. ElBoghdadly, and Essam A. Sourour Abstract In the last few years, we have seen an explosive growth of wireless LAN

More information

Analysis of RF requirements for Active Antenna System

Analysis of RF requirements for Active Antenna System 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) Analysis of RF requirements for Active Antenna System Rong Zhou Department of Wireless Research Huawei Technology

More information

SPACE TIME CODING FOR MIMO SYSTEMS. Fernando H. Gregorio

SPACE TIME CODING FOR MIMO SYSTEMS. Fernando H. Gregorio SPACE TIME CODING FOR MIMO SYSTEMS Fernando H. Gregorio Helsinki University of Technology Signal Processing Laboratory, POB 3000, FIN-02015 HUT, Finland E-mail:Fernando.Gregorio@hut.fi ABSTRACT With space-time

More information

Comparative Channel Capacity Analysis of a MIMO Rayleigh Fading Channel with Different Antenna Spacing and Number of Nodes

Comparative Channel Capacity Analysis of a MIMO Rayleigh Fading Channel with Different Antenna Spacing and Number of Nodes Comparative Channel Capacity Analysis of a MIMO Rayleigh Fading Channel with Different Antenna Spacing and Number of Nodes Anand Jain 1, Kapil Kumawat, Harish Maheshwari 3 1 Scholar, M. Tech., Digital

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs

CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs Xu Zhang and Edward W. Knightly ECE Department, Rice University Channel State Information (CSI) CSI plays a key role in wireless

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Multiple Input Multiple Output (MIMO) Operation Principles

Multiple Input Multiple Output (MIMO) Operation Principles Afriyie Abraham Kwabena Multiple Input Multiple Output (MIMO) Operation Principles Helsinki Metropolia University of Applied Sciences Bachlor of Engineering Information Technology Thesis June 0 Abstract

More information

Channel Modeling ETI 085

Channel Modeling ETI 085 Channel Modeling ETI 085 Overview Lecture no: 9 What is Ultra-Wideband (UWB)? Why do we need UWB channel models? UWB Channel Modeling UWB channel modeling Standardized UWB channel models Fredrik Tufvesson

More information

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Min Song, Trent Allison Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529, USA Abstract

More information

IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 3, JUNE TRIEDS: Wireless Events Detection Through the Wall

IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 3, JUNE TRIEDS: Wireless Events Detection Through the Wall IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 3, JUNE 2017 723 TRIEDS: Wireless Events Detection Through the Wall Qinyi Xu, Student Member, IEEE, Yan Chen, Senior Member, IEEE, Beibei Wang, Senior Member,

More information